Tag Archives: CyberSecurity
OAuth application abuse used to gain Exchange Online access
Microsoft researchers recently found a new type of attack. Hackers compromise Exchange Online access with malicious OAuth applications and then use it to change your email settings and spread spam. OAuth applications are growing in popularity. One of the first malicious uses of OAuth applications is consent phishing. Consent phishing is a particularly sly form…
Hackers Pivoting Around Macro Blocking in Microsoft Office
Hackers Pivoting Around Macro Blocking in Microsoft Office by using file formats such as ISO, RAR, ZIP, and IMG to send malicious documents.
Ransomware attacks on retail increase
Sophos surveyed more than 300 retailers in 2021, and it found that 300 of them had been hit with ransomware attacks.
What Is A USB Rubber Ducky?
USB Rubber Ducky is a USB device that looks like a flash drive. It can be used to hack into systems, steal data and inject malicious codes into computers. The most important thing to remember about this device is that it can’t be detected by any anti-virus or firewall because it’s an HID device. What…
Tips on Cybersecurity Awareness and Training
Empower your employees and protect your organization with expert tips on cybersecurity awareness and training. Stay one step ahead of cyber threats.
The most impersonated brand in phishing attacks: Microsoft
Discover why Microsoft is the most impersonated brand in phishing attacks. Learn about the rise and fall of phishing incidents, industries targeted, and how to protect yourself.
Under Attack: Ransomware’s Unyielding Assault on Android Devices
Android devices face an unyielding assault as ransomware attacks surge. Discover the alarming rise and strategies to defend against this digital menace.
What Are Web App Based Attacks?
Web-based applications give us the ability to shop, email, bank, learn, and socialize. These applications can be used for shopping, communicating, and so much more. They’re a great way for businesses and consumers to connect. With the rise in popularity of apps, businesses now have a much larger attack surface. The average large business has…
The Cross-Platform Nightmare: Ransomware’s Assault on Various OSs
Uncover the alarming reach of RedAlert ransomware as it targets both Windows and Linux, encrypting vital files and shutting down virtual machines.
Are C-Suite Executives A Threat To Cyber Security?
A new study shows that executives are more vulnerable to security breaches than ever. BlackCloak, a cybersecurity company, surveyed 1,000 of its members—and discovered that 23% of executives have open ports on their home networks. And what’s worse, 20% of those with open ports have open security cameras. To top it off, 27% of executives’…